|
[[!meta title="Tails 5.3.1 is out"]]
|
|
|
[[!meta date="Tue, 02 Aug 2022 12:34:56 +0000"]]
|
|
|
This release is an emergency release to fix a security vulnerability in the *Linux* kernel.
|
|
|
Update the *Linux* kernel to 5.10.127-2, which fixes [CVE-2022-34918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918), a vulnerability that allows applications in Tails to gain administration privileges.
|
|
|
For example, if an attacker was able to exploit other unknown security vulnerabilities in *Tor Browser*, they might then use CVE-2022-34918 to take full control of your Tails and deanonymize you.
|
|
|
This attack is very unlikely, but could be performed by a strong attacker, such as a government or a hacking firm. We are not aware of this attack being used in the wild.
|
|
|
- Update *Thunderbird* to [91.12.0](https://www.thunderbird.net/en-US/thunderbird/91.12.0/releasenotes/).
|
|
|
<h1 id="get">Get Tails 5.3.1</h1>
|
|
|
- Automatic upgrades are available from Tails 5.0 or later to 5.3.1.
|
|
|
You can [[reduce the size of the download|doc/upgrade#reduce]] of future automatic upgrades by doing a manual upgrade to the latest version.
|
|
|
If you don't need installation or upgrade instructions, you can download Tails 5.3.1 directly:
|
|
|
[[For DVDs and virtual machines (ISO image)|install/download-iso]]
|
|
|
<h1 id="next">What's coming up?</h1>
|
|
|
Tails 5.4 is scheduled for August 23.
|
|
|
Have a look at our [[!tails_roadmap]] to see where we are heading to.
|
|